IT Management  >   Systems Operations  >   Security  >   Security Management  >  

SIEM

RSS Feed    Add to Google    Add to My Yahoo!
SIEM White Papers (View All Report Types)
 
Few Fully Prepared for Software Security Risks
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper shows you results from a recent security survey and the value of testing your security measure regularly.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

5-Step Guide For GDPR Compliance
sponsored by Druva Software
WHITE PAPER: This white paper shows you a 5-point plan to prepare your organization to meet the new needs of data protection regulations. Learn how to track the creation of new files on laptops and other mobile devices and automatically ensure that files containing customer data and PII are protected.
Posted: 13 May 2016 | Published: 01 Apr 2016

Druva Software

Satisfy that Android sweet tooth: Making it work for your enterprise
sponsored by IBM MaaS360
WHITE PAPER: Protect your corporate data while giving users seamless access to work information on their devices. Take advantage of unified policies, threat management, app distribution, device management and a standard framework for a consistent experience across a wide variety of Android devices.
Posted: 26 May 2016 | Published: 01 Apr 2016

IBM MaaS360

Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale
sponsored by Anomali
WHITE PAPER: To address growing scalability issues, organizations will need to embrace a distributed computing approach to security. In addition, Threat Intelligence Platforms will need to create organizational relevance for threat intelligence data.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Anomali

Top 10 Zero-Day Exploits of 2015
sponsored by Palo Alto Networks
WHITE PAPER: This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns. It also provides additional details on three particularly effective zero-day exploits in brief case studies.
Posted: 30 Jun 2016 | Published: 01 May 2016

Palo Alto Networks

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM MaaS360
WHITE PAPER: Your goal is to make BYOD policies feasible by seamlessly securing corporate data on the device while providing logical separation from personal activities. Learn five key steps you should consider before putting your BYOD program in place.
Posted: 18 May 2016 | Published: 31 Dec 2012

IBM MaaS360

Encrypt Everything How to Unshare and Secure Your Sensitive Data Wherever It Resides
sponsored by Gemalto
WHITE PAPER: Stuck in the data protection dilemma? How do you find a way to balance critical business needs and requirements, while protecting your data from malicious threats? Learn a multitier plan that helps you protect your perimeter while also encrypting data in every level, moving or at rest.
Posted: 17 May 2016 | Published: 01 Apr 2016

Gemalto

Analyze this: Security analytics for the midrange enterprise
sponsored by SAS
WHITE PAPER: How do you define security analytics? Discover how other organizations define security analytics and uncover the key benefits to an analytics program. Learn how you can assess security performance to make better spending and policy decisions.
Posted: 21 Jun 2016 | Published: 01 May 2016

SAS

Vendor Comparison for Web Application Firewalls
sponsored by Dimension Data
WHITE PAPER: Imperva, a leading provider of cyber security solutions is once again the only leader in Gartner's Magic Quadrant for Web Application Firewall—the only company positioned in the leader's quadrant by Gartner in each of the two years this report has been published.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Dimension Data

Secure your mobile devices, data and apps
sponsored by Verizon
WHITE PAPER: This white paper teaches you how to assess your existing security policies, giving you advice on potential weaknesses and best practices to strengthen your mobile security. Get better peace of mind with policies that keep data, devices and apps in line no matter where your workforce roams.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement